Nessus Plugin #14513
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200406-02] tripwire: Format string vulnerability
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2004 Michel Arboi
- Summary:
- tripwire: Format string vulnerability
- Version:
- $Revision: 1.1 $
- Cve_id:
- -
- Bugtraq_id:
- -
- Xrefs:
- GLSA:200406-02
- Description:
- The remote host is affected by the vulnerability described in GLSA-200406-02
(tripwire: Format string vulnerability)
The code that generates email reports contains a format string
vulnerability in pipedmailmessage.cpp.
Impact
With a carefully crafted filename on a local filesystem an attacker could
cause execution of arbitrary code with permissions of the user running
tripwire, which could be the root user.
Workaround
There is no known workaround at this time.
References:
http://www.securityfocus.com/archive/1/365036/2004-05-31/2004-06-06/0
Solution:
All tripwire users should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=app-admin/tripwire-2.3.1.2-r1"
# emerge ">=app-admin/tripwire-2.3.1.2-r1"
Risk Factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.